Luan Tran (@luantq_) 's Twitter Profile
Luan Tran

@luantq_

ID: 1785627255475253248

calendar_today01-05-2024 11:08:38

0 Tweet

1 Takipçi

29 Takip Edilen

Oca (@francisco_oca) 's Twitter Profile Photo

Take a look at the new BoxPwnr WebUI, you can quickly replay a trace/trajectory, jump around, speed it up, and navigate it through a cool LLM generated attack path. Try it yourself! 0ca.github.io/BoxPwnr-Attemp… Sound: On🎵

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

New blog post: Building a Pipeline for Agentic Malware Analysis Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage Link: synthesis.to/2026/03/18/age… Github: github.com/mrphrazer/agen…

New blog post: Building a Pipeline for Agentic Malware Analysis

Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage

Link: synthesis.to/2026/03/18/age…

Github: github.com/mrphrazer/agen…
Smukx.E (@5mukx) 's Twitter Profile Photo

Exploit Development: Windows Kernel Exploitation - Debugging Environment and Stack Overflow connormcgarr.github.io/Kernel-Exploit… #exploit

Exploit Development: Windows Kernel Exploitation - Debugging Environment and Stack Overflow

connormcgarr.github.io/Kernel-Exploit…

#exploit
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Claude Code skill for AI-assisted bug bounty hunting - recon, IDOR, XSS, SSRF, OAuth, GraphQL, LLM injection, and report generation github.com/shuvonsec/clau…

0xor0ne (@0xor0ne) 's Twitter Profile Photo

"From Zero to QEMU: A journey into system emulation" (Slide deck covering QEMU system emulation internals by Antonio Nappa) docs.google.com/presentation/d… #infosec #qemu

"From Zero to QEMU: A journey into system emulation" (Slide deck covering QEMU system emulation internals by Antonio Nappa)

docs.google.com/presentation/d…

#infosec #qemu
stuxf (@stuxfdev) 's Twitter Profile Photo

We at Veria Labs built an autonomous CTF agent in a weekend and won 1st place at BSidesSF 2026, solving all 52/52 challenges. It races multiple AI models (Claude, GPT-5.4) in parallel, each in isolated Docker sandboxes with full CTF tooling. A coordinator LLM reads solver

Smukx.E (@5mukx) 's Twitter Profile Photo

The art of Self-Mutating Malware TLDR; This blog post demonstrates how to build your own polymorphic engine, and a bit on metamorphic code for Self-mutating in malware. f00crew.org/0x48

The art of Self-Mutating Malware 

TLDR; This blog post demonstrates how to build your own polymorphic engine, and a bit on metamorphic code for Self-mutating in malware. 

f00crew.org/0x48
Gameel Ali 🤘 (@malgamy12) 's Twitter Profile Photo

🔬 Built malops.io for hands-on malware analysis practice. 14 free challenges + 2 APT labs covering API hashing, shellcode, C2 reversing & full attack chains. Real binaries. Real questions. No setup. Discord: discord.gg/hnXXB38xzK

🔬 Built malops.io for hands-on malware analysis practice.

14 free challenges + 2 APT labs covering API hashing, shellcode, C2 reversing & full attack chains.

Real binaries. Real questions. No setup.

Discord: discord.gg/hnXXB38xzK
trish (@_trish_xd) 's Twitter Profile Photo

List of C/C++ Project Ideas in Networking Programming 🔗 Here's a collection of practical projects with references to help you get started: 1. Let's Code a TCP/IP Stack - Part 1: Ethernet & ARP saminiir.com/lets-code-tcp-… - Part 2: IPv4 & ICMPv4 saminiir.com/lets-code-tcp-… -

List of C/C++ Project Ideas in Networking Programming 🔗

Here's a collection of practical projects with references to help you get started:

1. Let's Code a TCP/IP Stack

  - Part 1: Ethernet & ARP saminiir.com/lets-code-tcp-…
  - Part 2: IPv4 & ICMPv4 saminiir.com/lets-code-tcp-…
  -
Chaofan Shou (svm/acc) (@shoucccc) 's Twitter Profile Photo

Chinese LLMs can hack better than state-sponsored hackers with properly evolved harness - Kimi K2.5 managed to find and exploit 6 vulnerabilities in browsers: a single page view or an extension install by victims equal full system hijack. Check arxiv.org/abs/2604.20801

Chinese LLMs can hack better than state-sponsored hackers with properly evolved harness - 

Kimi K2.5 managed to find and exploit 6 vulnerabilities in browsers: a single page view or an extension install by victims equal full system hijack. 

Check arxiv.org/abs/2604.20801
Smukx.E (@5mukx) 's Twitter Profile Photo

How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection s4dbrd.github.io/posts/how-kern… #Kernel #Anticheat #windows

How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection

s4dbrd.github.io/posts/how-kern…

#Kernel #Anticheat #windows